Overview

Multifactor authentication combines two or more independent credentials: what the user knows (password), what the user has (security token) and what the user is (biometric verification). The goal of MFA is to create a layered defense and make it more difficult for an unauthorized person to access a target such as a physical location, computing device, network or database. If one factor is compromised or broken, the attacker still has at least one more barrier to breach before successfully breaking into the target.

Hardware-Based MFA

Hardware-based multifactor authentication, like Intel Authenticate, verifies identities by using multiple hardware encrypted factors at the same time: a single-use code, your Device ID, and your fingerprint.
Critical data is captured, encrypted, matched, and stored in hardware, closing the door and making it harder for even the most advanced threats to reach it.

Biometric

We’ve seen face scanners in movies for years, but now they’re a reality. You can add your fingerprint or facial characteristics to verify it’s you logging in. For example, Windows Hello logs you in with facial recognition with the camera typically found on your mobile device, tablet or PC.

Single-Use Codes

This is the most common type of strong authentication. After you enter your username and password, you’ll enter a one-time code sent to your phone.

Contextual

Many apps use contextual clues like a user’s location, IP Address, WiFi Network, and your device to make sure you’re you.

How the Secret Service is fighting offline identity theft.

Pwnd — how a Google hacker would hack you.

Parisa Tabriz manages the Chrome Security team, who work on making Chrome the safest way to browse the web. The best defense requires an offensive mindset, so it’s her job to think like a criminal. Here’s how she’d hack you.

Batman beats Superman, and other finds in 10 million leaked Passwords.

Last year, the single largest dataset of actual user passwords was released by security researcher Mark Burnett. While we’re advised to use nothing more than random characters, our passwords are a reflection of our culture, as much as ourselves. Here’s what they have to say.